CyberCrimes

5,827 views

Published on

Cybercrimes presentation in European University of Lefke

Published in: Technology
0 Comments
5 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
5,827
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
661
Comments
0
Likes
5
Embeds 0
No embeds

No notes for slide

CyberCrimes

  1. 1. Speakers :Fettah KURTULUŞ
  2. 2.  Computer crime, or cybercrime, refers to any crime that involves a computer and a network(Internet).
  3. 3.  The Computer as a Target : using a computer to attack other computers. The computer as a weapon : using a computer to commit real world crimes.
  4. 4.  HACKING VIRUS DISSEMINITION COMPUTER VANDALISM CYBER TERRORISM SOFTWARE PIRACY
  5. 5. Hacking in simple termsmeans an illegal attackinto a computer systemand/or network. It is alsoknown as CRACKING.Government websites arethe hot targets of thehackers due to the presscoverage, it receives.Hackers enjoy the mediacoverage.
  6. 6. Malicious software that attaches itself to other software.(virus, worms, Trojan Horse, web jacking, e-mail bombingetc)
  7. 7. Damaging or destroying data rather than stealing ormisusing them is called cyber vandalism. Transmittingvirus: These are programs that attach themselves to a fileand then circulate .
  8. 8. Terrorist attacks on the Internet is by distributed denial ofservice attacks, hate websites and hate emails, attackson sensitive computer networks, etc. Technology savvyterrorists are using 512-bit encryption, which isimpossible to decrypt.
  9. 9. Theft of software through the illegal copying of genuineprograms or the counterfeiting and distribution ofproducts intended to pass for the original.
  10. 10. Internet security is a branchof computer security specificallyrelated to the Internet. Its objective is to establish rulesand measure to use againstattacks over the Internet.
  11. 11.  Use antivirus software’s insert firewalls uninstall unnecessary software maintain backup check security settings Stay anonymous - choose a genderless screen name Never give your full name or address to strangers
  12. 12.  Learn ‘inetiquette - follow it and expect it from others Dont respond to harassing or negative messages (flames) Get out of uncomfortable or hostile situations quickly Save offending messages Learn more about Internet privacy
  13. 13.  The cyber security will defend us from critical attacks. It helps us to browse the safe website. Internet security process all the incoming and outgoing data on our computer.
  14. 14.  security will defend from hacks and virus. The application of cyber security used in our PC needs update every week. The security developers will update their database every week once. Hence the new virus also deleted
  15. 15. Technology is destructive only in the hands ofpeople who do not realize that they are one andthe same process as the universe.Alan Watts“Technology is like a fish. The longer it stayson the shelf, the less desirable it becomes.”

×